Advertisement

DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data

  • Prabir Kumar NaskarEmail author
  • Soumya Paul
  • Dipta Nandy
  • Atal Chaudhuri
Article
  • 9 Downloads

Abstract

Multimedia file like audio demands special encryption technique due to its large data capacity without compromising correlation between it’s original and encrypted version (closer to zero). Most of the popular block cipher techniques work on multiple rounds whereas the proposed scheme guarantees the necessary low correlation between the original and the encrypted file without multiple rounds. The unique feature is that the consecutive blocks use different keys derived from the original one using the proposed key chaining algorithm and experimental results show that the correlation between the consecutive keys is also close to zero. The used encryption technique is based on DNA encoding with logistic chaotic map using the generated chain of keys. Furthermore, the concept of channel shuffling is introduced to make the encrypted data more secure. The experimental results confirm that the correlation between the original and ciphered block is close to zero and number of samples change rate value is close to 100. Again correlation between the two consecutive ciphered blocks is also close to zero, which conforms the acceptability of proposed scheme.

Keywords

Audio encryption DNA encoding Logistic chaotic map Channel shuffling Statistical analysis 

Notes

Acknowledgements

We are thankful to the Department of Computer Science & Engineering, Government College of Engineering and Textile Technology, Serampore, Hooghly, W.B., India for giving us the platform for planning and developing this work using all departmental facilities.

References

  1. 1.
    Adleman LM (1994) Molecular computation of solutions to combinatorial problems. American Association for the Advancement of Science 266(5187):1021–1024CrossRefGoogle Scholar
  2. 2.
    Adleman LM (1998) Computing with DNA. Sci Am:54–61CrossRefGoogle Scholar
  3. 3.
    Barker WC, Barker E (2012) Recommendation for the triple data encryption algorithm (tdea) block cipher. NIST Special Publication 800–67, Revision-1, pp. 1—26Google Scholar
  4. 4.
    Bhargava B, Shi C, Wang S-Y (2004) Mpeg video encryption algorithms. Multimed Tools Appl 24(1):57–79CrossRefGoogle Scholar
  5. 5.
    Daemen J, Rijmen V (2001) Rijndael: The advanced encryption standard. Dr Dobb’s Journal:137–139Google Scholar
  6. 6.
    Elhoseny M, Shankar K, Lakshmanaprabu SK, Maseleno A, Arunkumar N (2018) Hybrid optimization with cryptography encryption for medical image security in internet of things. Neural Comput & Applic:1–15Google Scholar
  7. 7.
    Enayatifar R, Addula AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng, Elsevier 56:83–93CrossRefGoogle Scholar
  8. 8.
    Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos, Solitons Fractals, Elsevier 29:393–399CrossRefGoogle Scholar
  9. 9.
    Grangetto M, Magli E, Olmo G (2006) Multimedia selective encryption by means of randomized arithmetic coding. IEEE Transactions on Multimedia 8(5):905–917CrossRefGoogle Scholar
  10. 10.
    Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, HersheyCrossRefGoogle Scholar
  11. 11.
    Ibtihal M, Driss EO, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. International Journal of Cloud Applications and Computing 7(2):27–40CrossRefGoogle Scholar
  12. 12.
    Jiao SH, Goutte R (2008) Code for encryption hiding data into genomic DNA of living organisms. In: Proceedings of the 9th International Conference on Signal Processing (ICSP’08), China, pages 2166–2169Google Scholar
  13. 13.
    Kalpana M, Ratnavelu K, Balasubramaniam P (2018) An audio encryption based on synchronization of robust bam fcnns with time delays. Multimed Tools Appl:1–20Google Scholar
  14. 14.
    Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3d chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943–2959MathSciNetCrossRefGoogle Scholar
  15. 15.
    Kanso A, Smaoui N (2009) Logistic chaotic maps for binary numbers generations. Chaos, Solitons Fractals 40:2557–2568CrossRefGoogle Scholar
  16. 16.
    Lima JB, da Silva Neto EF (2016) Audio encryption based on the cosine number transform. Multimed Tools Appl 75(14):8403–8418CrossRefGoogle Scholar
  17. 17.
    Liu H, Kadir A, Li Y (2016) Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys. Optik - International Journal for Light and Electron Optics 127(19):7431–7438CrossRefGoogle Scholar
  18. 18.
    Madain A, Dalhoum ALA, Hiary H, Ortega A, Alfonseca M (2012) Audio scrambling technique based on cellular automata. Multimed Tools Appl 71(3):1803–1822CrossRefGoogle Scholar
  19. 19.
    Mosa E, Messiha NW, Zahran O, El-Samie EA (2011) Chaotic encryption of speech signals. International Journal of Speech Technology 14CrossRefGoogle Scholar
  20. 20.
    Naskar PK, Khan HN, Roy U, Chaudhuri A, Chaudhuri A (2011) Secret image sharing with embedded session key. Computer Information System-Analysis and Technologies 245:286–294Google Scholar
  21. 21.
    Naskar PK, Chaudhuri A (2015) A robust image encryption technique using dual chaotic map. International Journal of Electronic Security and Digital Forensics, Inderscience 7(4):358–380CrossRefGoogle Scholar
  22. 22.
    Naskar PK, Chaudhuri A (2016) Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image. The Imaging Science Journal, Taylor & Francis 94(8):460–470CrossRefGoogle Scholar
  23. 23.
    Naskar PK, Chaudhuri A, Chaudhuri A (2014) A secure symmetric image encryption based on linear geometry. Applications and Innovations in Mobile Computing (AIMoC)-14:67–74Google Scholar
  24. 24.
    Naskar PK, Khan HN, Chaudhuri A, Chaudhuri A (2011) Ultra secured and authentic key distribution protocol using a novel secret sharing technique. Int J Comput Appl 19(7):12–15Google Scholar
  25. 25.
    Naskar PK, Khan HN, Roy U, Chaudhuri A, Chaudhuri A (2011) Shared cryptography with embedded session key for secret audio. Int J Comput Appl 26(8):5–9Google Scholar
  26. 26.
    National Bureau of Standards (1999) Data encryption standard. Federal Information Processing Standards Publication 46(3):1–22Google Scholar
  27. 27.
    Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934CrossRefGoogle Scholar
  28. 28.
    Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRefGoogle Scholar
  29. 29.
    Sathiyamurthi P, Ramakrishnan S (2017) Speech encryption using chaotic shift keying for secured speech communication. EURASIP Journal on Audio, Speech and Music Processing 20:1–11Google Scholar
  30. 30.
    Servetti A, De Martin JCD (2002) Perception-based partial encryption of compressed speech. IEEE Transactions on Speech and Audio Processing 10(8):637–643CrossRefGoogle Scholar
  31. 31.
    Servetti A, Testa C, De Martin JC (2003) Frequency-selective partial encryption of compressed audio. IEEE International Conference on Acoustics, Speech and Signal Processing:668–671Google Scholar
  32. 32.
    Shankar K, Elhoseny M, Kumar RS, Lakshmanaprabu SK, Yuan X (2018) Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J Ambient Intell Humaniz Comput:1–13Google Scholar
  33. 33.
    Thorwirth NJ, Horvatic P, Weis R, Zhao J (2002) Security methods for mp3 music delivery. Thirty-Fourth Asilomar Conference on Signal, Systems and Computers, pages 1831–1835Google Scholar
  34. 34.
    Yakubu MA, Maddage NC, Atrey PK (2015) Audio secret management scheme using shamir’s secret sharing. International Conference on Multimedia Modeling. LNC, pages 396–407Google Scholar
  35. 35.
    Yan WQ, Fu WG, Kankanhalli MS (2008) Progressive audio scrambling in compressed domain. IEEE Transaction on Multimedia 10(6):960–968CrossRefGoogle Scholar
  36. 36.
    Yu Z, Gao CZ, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918–31923CrossRefGoogle Scholar
  37. 37.
    Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608CrossRefGoogle Scholar
  38. 38.
    Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711–722CrossRefGoogle Scholar
  39. 39.
    Zhou J, Au OC (2010) Security and efficiency analysis of progressive audio scrambling in compressed domain. IEEE International Conference on Acoustics, Speech and Signal Processing:1802–1805Google Scholar
  40. 40.
    Zhou Y, Bao L, Chen CLP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172–182CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Prabir Kumar Naskar
    • 1
    Email author
  • Soumya Paul
    • 2
  • Dipta Nandy
    • 1
  • Atal Chaudhuri
    • 3
  1. 1.Department of Computer Science & EngineeringGovernment College of Engineering & Textile TechnologySeramporeIndia
  2. 2.Department of Computer Science & EngineeringJadavpur UniversityKolkataIndia
  3. 3.Veer Surendra Sai University of Technology (VSSUT)SambalpurIndia

Personalised recommendations